[Full-disclosure] [SECURITY] CVE-2011-3375 Apache Tomcat Information disclosure

2012-01-17 Thread Mark Thomas
CVE-2011-3375 Apache Tomcat Information disclosure Severity: Important Vendor: The Apache Software Foundation Versions Affected: - Tomcat 7.0.0 to 7.0.21 - Tomcat 6.0.30 to 6.0.33 - Earlier versions are not affected Description: For performance reasons, information parsed from a request is

[Full-disclosure] [SECURITY] CVE-2012-0022 Apache Tomcat Denial of Service

2012-01-17 Thread Mark Thomas
CVE-2012-0022 Apache Tomcat Denial of Service Severity: Important Vendor: The Apache Software Foundation Versions Affected: - Tomcat 7.0.0 to 7.0.22 - Tomcat 6.0.0 to 6.0.33 - Tomcat 5.5.0 to 5.5.34 - Earlier, unsupported versions may also be affected Description: Analysis of the recent hash

[Full-disclosure] [TOOL RELEASE] Exploit Next Generation SQL Fingerprint v1.12.120115/RC0

2012-01-17 Thread Nelson Brito
It has been a long, long time since the last public release (more than one year) of the Exploit Next Generation® SQL Fingerprint, but it is back to the road. For those that are not familiarized with Exploit Next Generation® SQL Fingerprint, it is a powerful tool which performs version

[Full-disclosure] PHP 5.3.8 Multiple vulnerabilities

2012-01-17 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ PHP 5.3.8 Multiple vulnerabilities ] Author: Maksymilian Arciemowicz Website: http://cxsecurity.com/ Date: 14.01.2012 CVE: CVE-2011-4153 (zend_strndup) Original link: http://cxsecurity.com/research/103 [--- 1. Multiple NULL Pointer Dereference

[Full-disclosure] [SECURITY] [DSA 2389-1] linux-2.6 security update

2012-01-17 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2389-1secur...@debian.org http://www.debian.org/security/ Dann Frazier January 15, 2012

[Full-disclosure] Tine v2.0 Maischa - Cross Site Scripting Vulnerability

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == Tine v2.0 Maischa - Cross Site Scripting Vulnerability Date: = 2012-01-13 References: === http://www.vulnerability-lab.com/get_content.php?id=379 VL-ID: = 379 Introduction: = Tine 2.0 is an open source project which combines groupware and CRM in

[Full-disclosure] MegaSWF - Persistant Cross Site Scripting Vulnerability

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == MegaSWF - Persistant Cross Site Scripting Vulnerability Date: = 2012-01-12 References: === http://www.vulnerability-lab.com/get_content.php?id=368 VL-ID: = 368 Introduction: = Do you create Flash games, Flash animations, or any other type of

[Full-disclosure] Canopus Internet Banking FIVE - Auth Bypass Vulnerability

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == Canopus Internet Banking FIVE - Auth Bypass Vulnerability Date: = 2012-01-12 References: === http://www.vulnerability-lab.com/get_content.php?id=305 VL-ID: = 305 Introduction: = Automation of banks, small and medium sized, money transfer systems,

[Full-disclosure] Zimbra Desktop v7.1.2 - Persistent Software Vulnerability

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == Zimbra Desktop v7.1.2 - Persistent Software Vulnerability Date: = 2012-01-12 References: === http://www.vulnerability-lab.com/get_content.php?id=378 VL-ID: = 378 Introduction: = The Zimbra offline client (also Zimbra Desktop) for Microsoft Windows,

[Full-disclosure] DUS INT Airport - Multiple SQL Injection Vulnerabilities

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == DUS INT Airport - Multiple SQL Injection Vulnerabilities Date: = 2012-01-11 References: === http://www.vulnerability-lab.com/get_content.php?id=173 VL-ID: = 173 Introduction: = Duesseldorf International - Large airports are regional poles for

[Full-disclosure] Barracuda SSL VPN 480 - Multiple Web Vulnerabilities

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == Barracuda SSL VPN 480 - Multiple Web Vulnerabilities Date: = 2012-01-12 References: === http://www.vulnerability-lab.com/get_content.php?id=35 VL-ID: = 35 Introduction: = The Barracuda SSL VPN is an integrated hardware and software solution

[Full-disclosure] WebTitan Appliance v3.50.x - Multiple Web Vulnerabilities

2012-01-17 Thread resea...@vulnerability-lab.com
Title: == WebTitan Appliance v3.50.x - Multiple Web Vulnerabilities Date: = 2012-01-13 References: === http://www.vulnerability-lab.com/get_content.php?id=89 VL-ID: = 89 Introduction: = WebTitan is a complete internet monitoring software (web filter) which

[Full-disclosure] dos attack on all 32bit php,asp etc services ?

2012-01-17 Thread Leutnant Steiner
hi, just for a nice sunday afternoon video, if nota already known see: http://www.phpclasses.org/blog/post/171-PHP-Vulnerability-May-Halt-Millions-of-Servers.html did somone expericence the inpacts described for this vulunerability ? are you all on 64bit greetz -- Disclaimer: This

Re: [Full-disclosure] ZDI-12-012 : (0Day) McAfee SaaS myCIOScn.dll ShowReport Method Remote Command Execution

2012-01-17 Thread Emanuel Rietveld
I might be missing something, but if exploitation of this vulnerability requires the ability to instantiate the activeX control and calling a method, how is this a vulnerability? If the user allows arbitrary activeX controls to instantiate and allows scripting access, one could simply

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-17 Thread E M
I would say that we need both types: the skiddies and the others. If you give to the skiddies enough fun at work they won't do something beyond the scope. But their scope should be: I have a site/system(of course, the test one, not the production one!) break it! They do it without being evil,

[Full-disclosure] trying to enhance online privacy

2012-01-17 Thread Andreas Pashalidis
Please help us enhance online privacy by participating in our anonymous survey at http://fheo.esat.kuleuven.be/survey We are currently working on a privacy-related browser extension, and want to make it more usable. For this, we need your help. It would be much appreciated if you could do the

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-17 Thread metasansana
Thus the sad state of security continues. While the experts and those with good intent continue to debate the line between legal and illegal, responsible and reckless, the malicious hackers continue to profit from the ignorance of average users and the sites they trust. Sent from my

[Full-disclosure] PenTest Extra 01/2012 Released

2012-01-17 Thread Krzysztof Marczyk
Hello, First issue of PenTest Extra in 2012 is released. This issue covers following articles: * XSS CSRF: Practical exploitation of post-authentication vulnerabilities in web applications by Marsel Nizamutdinov * Discovering Modern CSRF Patch Failures by Tyler Borland * Business

Re: [Full-disclosure] dos attack on all 32bit php, asp etc services ?

2012-01-17 Thread Ferenc Kovacs
On Sun, Jan 15, 2012 at 2:43 PM, Leutnant Steiner chk.mail...@gmail.comwrote: hi, just for a nice sunday afternoon video, if nota already known see: http://www.phpclasses.org/blog/post/171-PHP-Vulnerability-May-Halt-Millions-of-Servers.html did somone expericence the inpacts described for

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-17 Thread Martijn Broos
Most of the problems start already at education. There is not enough focus during school time what security beholds and what consequences are of bad design, bad programming, bad architecture and bad security principles. I know schoolbooks that even don't mention security at all or is explained

Re: [Full-disclosure] ZDI-12-012 : (0Day) McAfee SaaS myCIOScn.dll ShowReport Method Remote Command Execution

2012-01-17 Thread Jeffrey Walton
On Mon, Jan 16, 2012 at 4:33 AM, Emanuel Rietveld codehot...@gmail.com wrote: I might be missing something, but if exploitation of this vulnerability requires the ability to instantiate the activeX control and calling a method, how is this a vulnerability? If the user allows arbitrary activeX

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-17 Thread Valdis . Kletnieks
On Tue, 17 Jan 2012 14:09:13 +0100, Martijn Broos said: If programmers are aware of security consequences, they would fix them in the first place or try to avoid them. Unfortunately, there's this problem called already announced ship date. Go take a look at Skyrim - they announced 11/11/11

Re: [Full-disclosure] Full-Disclosure Digest, Vol 83, Issue 21

2012-01-17 Thread Mikhail A. Utin
Hello List, So far it has been very interesting discussion, but nevertheless nobody went to the Source, which is the Law, and used US Codes (or any others) as reference in the consideration of cases and examples. To the best of my judgment does not help too much and we are getting the result

Re: [Full-disclosure] Full-Disclosure Digest, Vol 83, Issue 21

2012-01-17 Thread Valdis . Kletnieks
On Tue, 17 Jan 2012 11:08:02 EST, Mikhail A. Utin said: So far it has been very interesting discussion, but nevertheless nobody went to the Source, which is the Law, 18 USC 1030 is the governing Federal statute in the US. In addition, many of the states have their own legislation.

Re: [Full-disclosure] Full-Disclosure Digest, Vol 83, Issue 21

2012-01-17 Thread Benjamin Kreuter
On Tue, 17 Jan 2012 12:28:11 -0500 valdis.kletni...@vt.edu wrote: Basically, you use a flaw to extract secret info from a protected computer, and you aren't an authorized pen tester with a signed get out of jail free card from the owner of the computer, you just bought yourself a felony rap.

Re: [Full-disclosure] Full-Disclosure Digest, Vol 83, Issue 21

2012-01-17 Thread Valdis . Kletnieks
On Tue, 17 Jan 2012 14:13:00 EST, Benjamin Kreuter said: Looking at that law, I am not even sure that you need to use a flaw to extract secret info. It looks like something as simple as transmitting a message to each user that dictates what they are authorized to do is enough to trigger the

Re: [Full-disclosure] Full-Disclosure Digest, Vol 83, Issue 21

2012-01-17 Thread BMF
On Tue, Jan 17, 2012 at 11:23 AM, valdis.kletni...@vt.edu wrote: Yes, people *have* been prosecuted for playing twiddle the URL games before.  I'd have to go dig up a cite, but it's happened (hacker was basically abusing a site's predictable URL scheme). Here is one relatively recent incident

[Full-disclosure] [CVE-2012-0207] Linux IGMP Remote Denial Of Service

2012-01-17 Thread HI-TECH .
Demonstration of the Exploit: http://www.youtube.com/watch?v=78nAxh70yZE (thanks ClsHack) see attached content /Kingcope /* ** linux-undeadattack.c ** Linux IGMP Remote Denial Of Service (Introduced in linux-2.6.36) ** CVE-2012-0207 ** credits to Ben Hutchings: **

Re: [Full-disclosure] [CVE-2012-0207] Linux IGMP Remote Denial Of Service

2012-01-17 Thread Dan Kaminsky
LAN-only, no? Sent from my iPhone On Jan 17, 2012, at 4:11 PM, HI-TECH . isowarez.isowarez.isowa...@googlemail.com wrote: Demonstration of the Exploit: http://www.youtube.com/watch?v=78nAxh70yZE (thanks ClsHack) see attached content /Kingcope undeadattack.c

Re: [Full-disclosure] [CVE-2012-0207] Linux IGMP Remote Denial Of Service

2012-01-17 Thread Valdis . Kletnieks
On Tue, 17 Jan 2012 16:14:46 EST, Dan Kaminsky said: LAN-only, no? Depends. Your network security people ever read BCP38? :) pgpxbRMaNseiP.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] [CVE-2012-0207] Linux IGMP Remote Denial Of Service

2012-01-17 Thread HI-TECH .
Tested and vulnerable against: * Linux kernels above or equal to 2.6.36 (local network) Untested * Your iPhone * I heard of rumours that the bug is triggerable using unicast addresses across the internet Am 17. Januar 2012 22:14 schrieb Dan Kaminsky d...@doxpara.com: LAN-only, no? Sent from

Re: [Full-disclosure] [CVE-2012-0207] Linux IGMP Remote Denial Of Service

2012-01-17 Thread xD 0x41
On 18 January 2012 09:38, HI-TECH . isowarez.isowarez.isowa...@googlemail.com wrote: Tested and vulnerable against: * Linux kernels above or equal to 2.6.36 (local network) Untested * Your iPhone * I heard of rumours that the bug is triggerable using unicast addresses across the internet

[Full-disclosure] The Bug Which Isn't a Bug

2012-01-17 Thread InterN0T Advisories
Dear Full Disclosers. A couple of days ago, I discovered a bug in the Disqus Widget for Blogger.com (I haven't heard anything from them yet, even though I've provided them with a permanent solution that fixes the problematic code entirely. See end of blog entry via the link.) When a user adds